RondoDox Botnet Exploits Critical XWiki Flaw, Urges Patch Now

RondoDox Botnet Exploits Critical XWiki Vulnerability CVE-2025-24893 for Remote Code Execution and DDoS Attacks

  • The RondoDox botnet is exploiting a serious vulnerability in unpatched XWiki instances to conduct cyberattacks.
  • CVE-2025-24893 is an eval injection flaw enabling remote code execution, patched in recent XWiki versions.
  • Exploitation attempts increased sharply in November, involving multiple threat actors and varied attack methods.
  • CISA has listed the vulnerability in its Known Exploited Vulnerabilities catalog, imposing federal mitigation deadlines.
  • Attacks include deploying cryptocurrency miners, reverse shells, and distributed denial-of-service (DDoS) activity.

The botnet Malware named RondoDox has been actively targeting unpatched instances of XWiki by exploiting a critical security flaw identified as CVE-2025-24893. This vulnerability, classified as an eval injection bug, permits any guest user to execute arbitrary remote code through requests to the “/bin/get/Main/SolrSearch” endpoint. The flaw was addressed in XWiki releases 15.10.11, 16.4.1, and 16.5.0RC1, issued in late February 2025.

- Advertisement -

Although evidence of exploitation dates back to March, significant activity was reported in late October when VulnCheck observed fresh attempts that leveraged the vulnerability for a two-stage attack deploying cryptocurrency mining software. Following this, the Cybersecurity and Infrastructure Security Agency (CISA) added the vulnerability to its Known Exploited Vulnerabilities (KEV) catalog, mandating federal agencies to implement protective measures by November 20.

A recent spike in exploitation attempts was documented by VulnCheck on November 7 and November 11, indicating intensified scanning efforts likely involving multiple threat actors. RondoDox emerged as a primary actor beginning November 3, incorporating this vulnerability as part of its arsenal to recruit compromised devices into a botnet aimed at conducting distributed denial-of-service (DDoS) attacks using HTTP, UDP, and TCP protocols.

Additional attack tactics observed include deploying cryptocurrency miners, attempts to create reverse shells, and generalized probing activities utilizing a Nuclei template for CVE-2025-24893. These events underscore the importance of consistent patch application to maintain security.

Jacob Baines of VulnCheck remarked that “CVE-2025-24893 is a familiar story: one attacker moves first, and many follow. Within days of the initial exploitation, we saw botnets, miners, and opportunistic scanners all adopting the same vulnerability.”

- Advertisement -

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

CFTC Taps Crypto CEOs for Advisory Panel as Congress Debates

The CFTC has added senior crypto executives to its Innovation Advisory Committee, including Coinbase...

Waymo Targets 1M Weekly Paid Rides by 2026

Waymo, owned by Alphabet, aims to surpass one million paid rides per week by...

Microsoft: Firms Use AI Buttons to Poison Chatbot Memories

A disturbing new digital manipulation tactic has been uncovered by Microsoft security researchers, who...

Aave Lab Offers Revenue, New Focus to DAO’s End Feud

Aave Labs has proposed a new framework directing all revenue from Aave-branded products to...

Soldier used military secrets for $150K crypto bets.

An Israeli reserve soldier and a civilian accomplice face charges for allegedly using military...

Must Read

Top 5 Testing Tools For Blockchain Applications in 2022

Blockchain apps have been adopted popularly by some prominent industries due to its being a decentralized-designed technology. Furthermore, these apps eliminate the risks that...
🔥 #AD Get 20% OFF any new 12 month hosting plan from Hostinger. Click here!